Microsoft made news in the week with the
widely reported vulnerability referred to as CVE-2020-0601, which impacts the
Windows CryptoAPI. the file was from a trusted, legitimate source. The user
would haven't any way of knowing the file was malicious, because the digital
signature would seem to be from a trusted provider. A successful exploit could
also allow the attacker to conduct man-in-the-middle attacks and decrypt tip on
user connections to the affected software. norton.com/setup | mcafee.com/activate
Since it had been identified, a public exploit
POC was posted which will allow any malicious party to use this exploit to sign
executables as a 3rd party. Additionally, the bug could intercept and faux
secure web (HTTPS) connections and has the facility to fake signatures for
files and emails.
Details on McAfee’s enterprise defenses
against this vulnerability are outlined below and available in knowledge domain
article KB92322. Additional products could also be updated with extra
countermeasures and defenses as our research uncovers more. we'll still update
the articles. Visit@- mcafee.com/activate